What is “Host Discovery” during WEP/WPA/LEAP attacks?
Since some attacks highly depend on the existance of associated clients or legitimate traffic, SILICAU goes into Host Discovery mode to locate clients in attempt to send spoofed deauthentication frames from the AP. If the deauthentication phase succeeds then it can help force reconnections or force the generation of a particular type of packet (ARP request, for example) that is needed for the particular attack to succeed. This is an important step in making attacks much faster. However if deauthentication is not successful then you will just have to wait passively for the type of traffic that you need. In the newest version of SILICAU there is a new feature to wait indefinitely for the needed element. This way you can walk away from SILICAU and let it work.